AWS :: Learn to secure your data, servers, and applications with AWS.
With organizations moving their workloads, applications, and infrastructure to the cloud at an unprecedented pace, security of all these resources has been a paradigm shift for all those who are responsible for security; experts, novices, and apprentices alike.
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing,
2018.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | With organizations moving their workloads, applications, and infrastructure to the cloud at an unprecedented pace, security of all these resources has been a paradigm shift for all those who are responsible for security; experts, novices, and apprentices alike. |
Beschreibung: | Chapter 4: Securing Applications in AWS. |
Beschreibung: | 1 online resource (119 pages) |
ISBN: | 9781789137637 1789137632 |
Internformat
MARC
LEADER | 00000cam a2200000Mi 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1029497365 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr |n|---||||| | ||
008 | 180324s2018 enk o 000 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d MERUC |d YDX |d OCLCQ |d IDB |d OCLCF |d OCLCO |d TEFOD |d OCLCQ |d LVT |d N$T |d OCLCQ |d OCLCO |d NZAUC |d OCLCQ |d OCLCO | ||
019 | |a 1029322020 |a 1029444938 |a 1029471053 | ||
020 | |a 9781789137637 |q (electronic bk.) | ||
020 | |a 1789137632 |q (electronic bk.) | ||
035 | |a (OCoLC)1029497365 |z (OCoLC)1029322020 |z (OCoLC)1029444938 |z (OCoLC)1029471053 | ||
037 | |a 59A8A4D1-602A-41CB-9A66-0D60F67835BE |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a TK5105.88813 |b .A584 2018eb | |
072 | 7 | |a COM |x 000000 |2 bisacsh | |
082 | 7 | |a 006.76 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Anthony, Albert. | |
245 | 1 | 0 | |a AWS : |b Learn to secure your data, servers, and applications with AWS. |
260 | |a Birmingham : |b Packt Publishing, |c 2018. | ||
300 | |a 1 online resource (119 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Cover; Copyright; Credits; Table of Contents; Preface; Chapter 1: AWS Virtual Private Cloud; Introduction; VPC Components; Subnets; Elastic Network Interfaces (ENI); Route Tables; Internet Gateway; Elastic IP Addresses; VPC Endpoints; Network Address Translation (NAT); VPC Peering; VPC Features and Benefits; Multiple Connectivity Options; Secure; Simple; VPC Use Cases; Hosting a Public Facing Website; Hosting Multi-Tier Web Application; Creating Branch Office and Business Unit Networks; Hosting Web Applications in the AWS Cloud That Are Connected with Your Data Center. | |
505 | 8 | |a Extending Corporate Network in AWS CloudDisaster Recovery; VPC Security; Security Groups; Network Access Control List; VPC Flow Logs; VPC Access Control; Creating VPC; VPC Connectivity Options; Connecting User Network to AWS VPC; Connecting AWS VPC with Other AWS VPC; Connecting Internal User with AWS VPC; VPC Limits; VPC Best Practices; Plan Your VPC before You Create It; Choose the Highest CIDR Block; Unique IP Address Range; Leave the Default VPC Alone; Design for Region Expansion; Tier Your Subnets; Follow the Least Privilege Principle; Keep Most Resources in the Private Subnet. | |
505 | 8 | |a Creating VPCs for Different Use CasesFavor Security Groups over NACLs; IAM Your VPC; Using VPC Peering; Using Elastic IP Instead of Public IP; Tagging in VPC; Monitoring a VPC; Summary; Assessments; Chapter 2: Data Security in AWS; Introduction; Encryption and Decryption Fundamentals; Envelope Encryption; Securing Data at Rest; Amazon S3; Permissions; Versioning; Replication; Server-Side Encryption; Client-Side Encryption; Amazon EBS; Replication; Backup; Encryption; Amazon RDS; Amazon Glacier; Amazon DynamoDB; Amazon EMR; Securing Data in Transit; Amazon S3; Amazon RDS; Amazon DynamoDB. | |
505 | 8 | |a Amazon EMRAWS KMS; KMS Benefits; Fully Managed; Centralized Key Management; Integration with AWS Services; Secure and Compliant; KMS Components; Customer Master Key (CMK); Data Keys; Key Policies; Auditing CMK Usage; Key Management Infrastructure (KMI); AWS CloudHSM; CloudHSM Features; Generate and Use Encryption Keys Using HSMs; Pay as You Go Model; Easy to Manage; AWS CloudHSM Use Cases; Offload SSL/TLS Processing for Web Servers; Protect Private Keys for an Issuing Certificate Authority; Enable Transparent Data Encryption for Oracle Databases; Amazon Macie. | |
505 | 8 | |a Data Discovery and ClassificationData Security; Summary; Assessments; Chapter 3: Securing Servers in AWS; EC2 Security Best Practices; EC2 Security; IAM Roles for EC2 Instances; Managing OS-Level Access to Amazon EC2 Instances; Protecting Your Instance from Malware; Secure Your Infrastructure; Intrusion Detection and Prevention Systems; Elastic Load Balancing Security; Building Threat Protection Layers; Testing Security; Amazon Inspector; Amazon Inspector Features and Benefits; Amazon Inspector Components; AWS Shield; AWS Shield Benefits; AWS Shield Features; Summary; Assessments. | |
500 | |a Chapter 4: Securing Applications in AWS. | ||
520 | |a With organizations moving their workloads, applications, and infrastructure to the cloud at an unprecedented pace, security of all these resources has been a paradigm shift for all those who are responsible for security; experts, novices, and apprentices alike. | ||
650 | 0 | |a Web services. |0 http://id.loc.gov/authorities/subjects/sh2003001435 | |
650 | 0 | |a Computer software |x Development. |0 http://id.loc.gov/authorities/subjects/sh85029535 | |
650 | 6 | |a Services Web. | |
650 | 7 | |a COMPUTERS |x General. |2 bisacsh | |
650 | 7 | |a Computer software |x Development |2 fast | |
650 | 7 | |a Web services |2 fast | |
776 | 0 | 8 | |i Print version: |a Anthony, Albert. |t AWS: Security Best Practices on AWS. |d Birmingham : Packt Publishing, ©2018 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1733803 |3 Volltext |
938 | |a EBL - Ebook Library |b EBLB |n EBL5322207 | ||
938 | |a EBSCOhost |b EBSC |n 1733803 | ||
938 | |a YBP Library Services |b YANK |n 15224606 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1029497365 |
---|---|
_version_ | 1816882416559587328 |
adam_text | |
any_adam_object | |
author | Anthony, Albert |
author_facet | Anthony, Albert |
author_role | |
author_sort | Anthony, Albert |
author_variant | a a aa |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.88813 .A584 2018eb |
callnumber-search | TK5105.88813 .A584 2018eb |
callnumber-sort | TK 45105.88813 A584 42018EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Cover; Copyright; Credits; Table of Contents; Preface; Chapter 1: AWS Virtual Private Cloud; Introduction; VPC Components; Subnets; Elastic Network Interfaces (ENI); Route Tables; Internet Gateway; Elastic IP Addresses; VPC Endpoints; Network Address Translation (NAT); VPC Peering; VPC Features and Benefits; Multiple Connectivity Options; Secure; Simple; VPC Use Cases; Hosting a Public Facing Website; Hosting Multi-Tier Web Application; Creating Branch Office and Business Unit Networks; Hosting Web Applications in the AWS Cloud That Are Connected with Your Data Center. Extending Corporate Network in AWS CloudDisaster Recovery; VPC Security; Security Groups; Network Access Control List; VPC Flow Logs; VPC Access Control; Creating VPC; VPC Connectivity Options; Connecting User Network to AWS VPC; Connecting AWS VPC with Other AWS VPC; Connecting Internal User with AWS VPC; VPC Limits; VPC Best Practices; Plan Your VPC before You Create It; Choose the Highest CIDR Block; Unique IP Address Range; Leave the Default VPC Alone; Design for Region Expansion; Tier Your Subnets; Follow the Least Privilege Principle; Keep Most Resources in the Private Subnet. Creating VPCs for Different Use CasesFavor Security Groups over NACLs; IAM Your VPC; Using VPC Peering; Using Elastic IP Instead of Public IP; Tagging in VPC; Monitoring a VPC; Summary; Assessments; Chapter 2: Data Security in AWS; Introduction; Encryption and Decryption Fundamentals; Envelope Encryption; Securing Data at Rest; Amazon S3; Permissions; Versioning; Replication; Server-Side Encryption; Client-Side Encryption; Amazon EBS; Replication; Backup; Encryption; Amazon RDS; Amazon Glacier; Amazon DynamoDB; Amazon EMR; Securing Data in Transit; Amazon S3; Amazon RDS; Amazon DynamoDB. Amazon EMRAWS KMS; KMS Benefits; Fully Managed; Centralized Key Management; Integration with AWS Services; Secure and Compliant; KMS Components; Customer Master Key (CMK); Data Keys; Key Policies; Auditing CMK Usage; Key Management Infrastructure (KMI); AWS CloudHSM; CloudHSM Features; Generate and Use Encryption Keys Using HSMs; Pay as You Go Model; Easy to Manage; AWS CloudHSM Use Cases; Offload SSL/TLS Processing for Web Servers; Protect Private Keys for an Issuing Certificate Authority; Enable Transparent Data Encryption for Oracle Databases; Amazon Macie. Data Discovery and ClassificationData Security; Summary; Assessments; Chapter 3: Securing Servers in AWS; EC2 Security Best Practices; EC2 Security; IAM Roles for EC2 Instances; Managing OS-Level Access to Amazon EC2 Instances; Protecting Your Instance from Malware; Secure Your Infrastructure; Intrusion Detection and Prevention Systems; Elastic Load Balancing Security; Building Threat Protection Layers; Testing Security; Amazon Inspector; Amazon Inspector Features and Benefits; Amazon Inspector Components; AWS Shield; AWS Shield Benefits; AWS Shield Features; Summary; Assessments. |
ctrlnum | (OCoLC)1029497365 |
dewey-full | 006.76 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.76 |
dewey-search | 006.76 |
dewey-sort | 16.76 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05260cam a2200541Mi 4500</leader><controlfield tag="001">ZDB-4-EBA-on1029497365</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|---|||||</controlfield><controlfield tag="008">180324s2018 enk o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">MERUC</subfield><subfield code="d">YDX</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IDB</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LVT</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">NZAUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1029322020</subfield><subfield code="a">1029444938</subfield><subfield code="a">1029471053</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781789137637</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1789137632</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1029497365</subfield><subfield code="z">(OCoLC)1029322020</subfield><subfield code="z">(OCoLC)1029444938</subfield><subfield code="z">(OCoLC)1029471053</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">59A8A4D1-602A-41CB-9A66-0D60F67835BE</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.88813</subfield><subfield code="b">.A584 2018eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">000000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">006.76</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Anthony, Albert.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">AWS :</subfield><subfield code="b">Learn to secure your data, servers, and applications with AWS.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2018.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (119 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Copyright; Credits; Table of Contents; Preface; Chapter 1: AWS Virtual Private Cloud; Introduction; VPC Components; Subnets; Elastic Network Interfaces (ENI); Route Tables; Internet Gateway; Elastic IP Addresses; VPC Endpoints; Network Address Translation (NAT); VPC Peering; VPC Features and Benefits; Multiple Connectivity Options; Secure; Simple; VPC Use Cases; Hosting a Public Facing Website; Hosting Multi-Tier Web Application; Creating Branch Office and Business Unit Networks; Hosting Web Applications in the AWS Cloud That Are Connected with Your Data Center.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Extending Corporate Network in AWS CloudDisaster Recovery; VPC Security; Security Groups; Network Access Control List; VPC Flow Logs; VPC Access Control; Creating VPC; VPC Connectivity Options; Connecting User Network to AWS VPC; Connecting AWS VPC with Other AWS VPC; Connecting Internal User with AWS VPC; VPC Limits; VPC Best Practices; Plan Your VPC before You Create It; Choose the Highest CIDR Block; Unique IP Address Range; Leave the Default VPC Alone; Design for Region Expansion; Tier Your Subnets; Follow the Least Privilege Principle; Keep Most Resources in the Private Subnet.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Creating VPCs for Different Use CasesFavor Security Groups over NACLs; IAM Your VPC; Using VPC Peering; Using Elastic IP Instead of Public IP; Tagging in VPC; Monitoring a VPC; Summary; Assessments; Chapter 2: Data Security in AWS; Introduction; Encryption and Decryption Fundamentals; Envelope Encryption; Securing Data at Rest; Amazon S3; Permissions; Versioning; Replication; Server-Side Encryption; Client-Side Encryption; Amazon EBS; Replication; Backup; Encryption; Amazon RDS; Amazon Glacier; Amazon DynamoDB; Amazon EMR; Securing Data in Transit; Amazon S3; Amazon RDS; Amazon DynamoDB.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Amazon EMRAWS KMS; KMS Benefits; Fully Managed; Centralized Key Management; Integration with AWS Services; Secure and Compliant; KMS Components; Customer Master Key (CMK); Data Keys; Key Policies; Auditing CMK Usage; Key Management Infrastructure (KMI); AWS CloudHSM; CloudHSM Features; Generate and Use Encryption Keys Using HSMs; Pay as You Go Model; Easy to Manage; AWS CloudHSM Use Cases; Offload SSL/TLS Processing for Web Servers; Protect Private Keys for an Issuing Certificate Authority; Enable Transparent Data Encryption for Oracle Databases; Amazon Macie.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Data Discovery and ClassificationData Security; Summary; Assessments; Chapter 3: Securing Servers in AWS; EC2 Security Best Practices; EC2 Security; IAM Roles for EC2 Instances; Managing OS-Level Access to Amazon EC2 Instances; Protecting Your Instance from Malware; Secure Your Infrastructure; Intrusion Detection and Prevention Systems; Elastic Load Balancing Security; Building Threat Protection Layers; Testing Security; Amazon Inspector; Amazon Inspector Features and Benefits; Amazon Inspector Components; AWS Shield; AWS Shield Benefits; AWS Shield Features; Summary; Assessments.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Chapter 4: Securing Applications in AWS.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">With organizations moving their workloads, applications, and infrastructure to the cloud at an unprecedented pace, security of all these resources has been a paradigm shift for all those who are responsible for security; experts, novices, and apprentices alike.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Web services.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2003001435</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer software</subfield><subfield code="x">Development.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85029535</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Services Web.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer software</subfield><subfield code="x">Development</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Web services</subfield><subfield code="2">fast</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Anthony, Albert.</subfield><subfield code="t">AWS: Security Best Practices on AWS.</subfield><subfield code="d">Birmingham : Packt Publishing, ©2018</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1733803</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL5322207</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1733803</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">15224606</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1029497365 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:28:16Z |
institution | BVB |
isbn | 9781789137637 1789137632 |
language | English |
oclc_num | 1029497365 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (119 pages) |
psigel | ZDB-4-EBA |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Packt Publishing, |
record_format | marc |
spelling | Anthony, Albert. AWS : Learn to secure your data, servers, and applications with AWS. Birmingham : Packt Publishing, 2018. 1 online resource (119 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Print version record. Cover; Copyright; Credits; Table of Contents; Preface; Chapter 1: AWS Virtual Private Cloud; Introduction; VPC Components; Subnets; Elastic Network Interfaces (ENI); Route Tables; Internet Gateway; Elastic IP Addresses; VPC Endpoints; Network Address Translation (NAT); VPC Peering; VPC Features and Benefits; Multiple Connectivity Options; Secure; Simple; VPC Use Cases; Hosting a Public Facing Website; Hosting Multi-Tier Web Application; Creating Branch Office and Business Unit Networks; Hosting Web Applications in the AWS Cloud That Are Connected with Your Data Center. Extending Corporate Network in AWS CloudDisaster Recovery; VPC Security; Security Groups; Network Access Control List; VPC Flow Logs; VPC Access Control; Creating VPC; VPC Connectivity Options; Connecting User Network to AWS VPC; Connecting AWS VPC with Other AWS VPC; Connecting Internal User with AWS VPC; VPC Limits; VPC Best Practices; Plan Your VPC before You Create It; Choose the Highest CIDR Block; Unique IP Address Range; Leave the Default VPC Alone; Design for Region Expansion; Tier Your Subnets; Follow the Least Privilege Principle; Keep Most Resources in the Private Subnet. Creating VPCs for Different Use CasesFavor Security Groups over NACLs; IAM Your VPC; Using VPC Peering; Using Elastic IP Instead of Public IP; Tagging in VPC; Monitoring a VPC; Summary; Assessments; Chapter 2: Data Security in AWS; Introduction; Encryption and Decryption Fundamentals; Envelope Encryption; Securing Data at Rest; Amazon S3; Permissions; Versioning; Replication; Server-Side Encryption; Client-Side Encryption; Amazon EBS; Replication; Backup; Encryption; Amazon RDS; Amazon Glacier; Amazon DynamoDB; Amazon EMR; Securing Data in Transit; Amazon S3; Amazon RDS; Amazon DynamoDB. Amazon EMRAWS KMS; KMS Benefits; Fully Managed; Centralized Key Management; Integration with AWS Services; Secure and Compliant; KMS Components; Customer Master Key (CMK); Data Keys; Key Policies; Auditing CMK Usage; Key Management Infrastructure (KMI); AWS CloudHSM; CloudHSM Features; Generate and Use Encryption Keys Using HSMs; Pay as You Go Model; Easy to Manage; AWS CloudHSM Use Cases; Offload SSL/TLS Processing for Web Servers; Protect Private Keys for an Issuing Certificate Authority; Enable Transparent Data Encryption for Oracle Databases; Amazon Macie. Data Discovery and ClassificationData Security; Summary; Assessments; Chapter 3: Securing Servers in AWS; EC2 Security Best Practices; EC2 Security; IAM Roles for EC2 Instances; Managing OS-Level Access to Amazon EC2 Instances; Protecting Your Instance from Malware; Secure Your Infrastructure; Intrusion Detection and Prevention Systems; Elastic Load Balancing Security; Building Threat Protection Layers; Testing Security; Amazon Inspector; Amazon Inspector Features and Benefits; Amazon Inspector Components; AWS Shield; AWS Shield Benefits; AWS Shield Features; Summary; Assessments. Chapter 4: Securing Applications in AWS. With organizations moving their workloads, applications, and infrastructure to the cloud at an unprecedented pace, security of all these resources has been a paradigm shift for all those who are responsible for security; experts, novices, and apprentices alike. Web services. http://id.loc.gov/authorities/subjects/sh2003001435 Computer software Development. http://id.loc.gov/authorities/subjects/sh85029535 Services Web. COMPUTERS General. bisacsh Computer software Development fast Web services fast Print version: Anthony, Albert. AWS: Security Best Practices on AWS. Birmingham : Packt Publishing, ©2018 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1733803 Volltext |
spellingShingle | Anthony, Albert AWS : Learn to secure your data, servers, and applications with AWS. Cover; Copyright; Credits; Table of Contents; Preface; Chapter 1: AWS Virtual Private Cloud; Introduction; VPC Components; Subnets; Elastic Network Interfaces (ENI); Route Tables; Internet Gateway; Elastic IP Addresses; VPC Endpoints; Network Address Translation (NAT); VPC Peering; VPC Features and Benefits; Multiple Connectivity Options; Secure; Simple; VPC Use Cases; Hosting a Public Facing Website; Hosting Multi-Tier Web Application; Creating Branch Office and Business Unit Networks; Hosting Web Applications in the AWS Cloud That Are Connected with Your Data Center. Extending Corporate Network in AWS CloudDisaster Recovery; VPC Security; Security Groups; Network Access Control List; VPC Flow Logs; VPC Access Control; Creating VPC; VPC Connectivity Options; Connecting User Network to AWS VPC; Connecting AWS VPC with Other AWS VPC; Connecting Internal User with AWS VPC; VPC Limits; VPC Best Practices; Plan Your VPC before You Create It; Choose the Highest CIDR Block; Unique IP Address Range; Leave the Default VPC Alone; Design for Region Expansion; Tier Your Subnets; Follow the Least Privilege Principle; Keep Most Resources in the Private Subnet. Creating VPCs for Different Use CasesFavor Security Groups over NACLs; IAM Your VPC; Using VPC Peering; Using Elastic IP Instead of Public IP; Tagging in VPC; Monitoring a VPC; Summary; Assessments; Chapter 2: Data Security in AWS; Introduction; Encryption and Decryption Fundamentals; Envelope Encryption; Securing Data at Rest; Amazon S3; Permissions; Versioning; Replication; Server-Side Encryption; Client-Side Encryption; Amazon EBS; Replication; Backup; Encryption; Amazon RDS; Amazon Glacier; Amazon DynamoDB; Amazon EMR; Securing Data in Transit; Amazon S3; Amazon RDS; Amazon DynamoDB. Amazon EMRAWS KMS; KMS Benefits; Fully Managed; Centralized Key Management; Integration with AWS Services; Secure and Compliant; KMS Components; Customer Master Key (CMK); Data Keys; Key Policies; Auditing CMK Usage; Key Management Infrastructure (KMI); AWS CloudHSM; CloudHSM Features; Generate and Use Encryption Keys Using HSMs; Pay as You Go Model; Easy to Manage; AWS CloudHSM Use Cases; Offload SSL/TLS Processing for Web Servers; Protect Private Keys for an Issuing Certificate Authority; Enable Transparent Data Encryption for Oracle Databases; Amazon Macie. Data Discovery and ClassificationData Security; Summary; Assessments; Chapter 3: Securing Servers in AWS; EC2 Security Best Practices; EC2 Security; IAM Roles for EC2 Instances; Managing OS-Level Access to Amazon EC2 Instances; Protecting Your Instance from Malware; Secure Your Infrastructure; Intrusion Detection and Prevention Systems; Elastic Load Balancing Security; Building Threat Protection Layers; Testing Security; Amazon Inspector; Amazon Inspector Features and Benefits; Amazon Inspector Components; AWS Shield; AWS Shield Benefits; AWS Shield Features; Summary; Assessments. Web services. http://id.loc.gov/authorities/subjects/sh2003001435 Computer software Development. http://id.loc.gov/authorities/subjects/sh85029535 Services Web. COMPUTERS General. bisacsh Computer software Development fast Web services fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2003001435 http://id.loc.gov/authorities/subjects/sh85029535 |
title | AWS : Learn to secure your data, servers, and applications with AWS. |
title_auth | AWS : Learn to secure your data, servers, and applications with AWS. |
title_exact_search | AWS : Learn to secure your data, servers, and applications with AWS. |
title_full | AWS : Learn to secure your data, servers, and applications with AWS. |
title_fullStr | AWS : Learn to secure your data, servers, and applications with AWS. |
title_full_unstemmed | AWS : Learn to secure your data, servers, and applications with AWS. |
title_short | AWS : |
title_sort | aws learn to secure your data servers and applications with aws |
title_sub | Learn to secure your data, servers, and applications with AWS. |
topic | Web services. http://id.loc.gov/authorities/subjects/sh2003001435 Computer software Development. http://id.loc.gov/authorities/subjects/sh85029535 Services Web. COMPUTERS General. bisacsh Computer software Development fast Web services fast |
topic_facet | Web services. Computer software Development. Services Web. COMPUTERS General. Computer software Development Web services |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1733803 |
work_keys_str_mv | AT anthonyalbert awslearntosecureyourdataserversandapplicationswithaws |